Reference Hub2
Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart

Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart

Qingyu Chen, Longsheng Wu, Li Li, Xuhan Ma, Xu An Wang
Copyright: © 2015 |Volume: 10 |Issue: 3 |Pages: 16
ISSN: 1554-1045|EISSN: 1554-1053|EISBN13: 9781466676251|DOI: 10.4018/IJITWE.2015070102
Cite Article Cite Article

MLA

Chen, Qingyu, et al. "Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart." IJITWE vol.10, no.3 2015: pp.17-32. http://doi.org/10.4018/IJITWE.2015070102

APA

Chen, Q., Wu, L., Li, L., Ma, X., & Wang, X. A. (2015). Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart. International Journal of Information Technology and Web Engineering (IJITWE), 10(3), 17-32. http://doi.org/10.4018/IJITWE.2015070102

Chicago

Chen, Qingyu, et al. "Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart," International Journal of Information Technology and Web Engineering (IJITWE) 10, no.3: 17-32. http://doi.org/10.4018/IJITWE.2015070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data security in the register file significantly decreases as a result of technology scaling. Based on pipeline restart, the method of improving the data security and reliability in register files is presented in this paper. As the data and its replica simultaneously exist as a redundant copy of each other in half-custom register files, when an uncorrectable error is detected in the data during the access of the register file, its replica will be checked for subsequent processor operation by the restart of pipeline. In addition, the correctable error in data or its replica can also be scrubbed by rollback and restart of pipeline. Finally, the proposed method is evaluated and the results show that the hardware overhead increases by only 2%, whereas the reliability of data in register file increases by more than 2.5 times. This method can significantly improve the data security in the register file without distinct overhead increasing.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.